"[syserr] lxc_start:96: Invalid argument - failed to fork into a new
namespace"
-Answer:
--------
+Answer:
+-------
read the lxc man page about kernel version prereq :) most probably
your kernel is not configured to support the container options you
The lxcpath of the original container. By default, the system
wide configured lxcpath will be used.
-->
- オリジナルのコンテナの lxcpath.デフォルトでは,システム全体で設定された lxcpath が使われます.
+ オリジナルのコンテナの lxcpath.デフォルトでは,システム全体で設定された lxcpath が使われます.
</para>
</listitem>
</varlistentry>
<listitem>
<para>
<!--
- List existing snapshots.
+ List existing snapshots.
-->
存在するスナップショットをリスト表示します.
</para>
<listitem>
<para>
<!--
- Show snapshot comments in the snapshots listings.
+ Show snapshot comments in the snapshots listings.
-->
スナップショットのリスト表示でスナップショットに対するコメントを表示します.
</para>
%description
Containers are insulated areas inside a system, which have their own namespace
-for filesystem, network, PID, IPC, CPU and memory allocation and which can be
-created using the Control Group and Namespace features included in the Linux
+for filesystem, network, PID, IPC, CPU and memory allocation and which can be
+created using the Control Group and Namespace features included in the Linux
kernel.
This package provides the lxc-* tools, which can be used to start a single
LXC_ATTACH_MOVE_TO_CGROUP = 0x00000001, //!< Move to cgroup
LXC_ATTACH_DROP_CAPABILITIES = 0x00000002, //!< Drop capabilities
LXC_ATTACH_SET_PERSONALITY = 0x00000004, //!< Set personality
- LXC_ATTACH_LSM_EXEC = 0x00000008, //!< Execute under a Linux Security Module
+ LXC_ATTACH_LSM_EXEC = 0x00000008, //!< Execute under a Linux Security Module
/* the following are off by default */
LXC_ATTACH_REMOUNT_PROC_SYS = 0x00010000, //!< Remount /proc filesystem
* \brief Determine process ID of the containers init process.
*
* \param c Container.
- *
+ *
* \return pid of init process as seen from outside the
* container.
*/
{ "cgroup.use", NULL },
{ NULL, NULL },
};
- /* Protected by a mutex to eliminate conflicting load and store operations */
+ /* Protected by a mutex to eliminate conflicting load and store operations */
static const char *values[sizeof(options) / sizeof(options[0])] = { 0 };
const char *(*ptr)[2];
const char *value;
-/*
+/*
* Copyright © 2012 Serge Hallyn <serge.hallyn@ubuntu.com>.
* Copyright © 2012 Canonical Ltd.
*
fi
eval set -- "$options"
-release=${release:-"cooker"}
+release=${release:-"cooker"}
if [ -f /etc/lsb-release ]; then
. /etc/lsb-release
if [ "$DISTRIB_ID" = "OpenMandrivaLinux" ]; then